1
|
Agrawal V, Agrawal S, Bomanwar A, Dubey T, Jaiswal A. Exploring the Risks, Benefits, Advances, and Challenges in Internet Integration in Medicine With the Advent of 5G Technology: A Comprehensive Review. Cureus 2023; 15:e48767. [PMID: 38098915 PMCID: PMC10719543 DOI: 10.7759/cureus.48767] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/29/2023] [Accepted: 11/13/2023] [Indexed: 12/17/2023] Open
Abstract
The integration of 5G technology in the healthcare sector is poised to bring about transformative changes, offering numerous advantages such as enhanced telemedicine services, expedited data transfer for medical records, improved remote surgery capabilities, real-time monitoring and diagnostics, advancements in wearable medical devices, and the potential for precision medicine. However, this technological shift is not without its concerns, including potential health implications related to 5G radiation exposure, heightened cybersecurity risks for medical devices and data systems, potential system failures due to technology dependence, and privacy issues linked to data breaches in healthcare. We are striking a balance between harnessing these benefits and addressing the associated risks. Achieving this equilibrium requires the establishment of a robust regulatory framework, ongoing research into the health impacts of 5G radiation, the implementation of stringent cybersecurity measures, education and training for healthcare professionals, and the development of ethical standards. The future of 5G in the medical field holds immense promise, but success depends on our ability to navigate this evolving landscape while prioritizing patient safety, privacy, and ethical practice.
Collapse
Affiliation(s)
- Varun Agrawal
- Medicine, Jawaharlal Nehru Medical College, Datta Meghe Institute of Higher Education and Research, Wardha, IND
| | - Suyash Agrawal
- Medicine, Jawaharlal Nehru Medical College, Datta Meghe Institute of Higher Education and Research, Wardha, IND
| | - Aarya Bomanwar
- Medicine, Jawaharlal Nehru Medical College, Datta Meghe Institute of Higher Education and Research, Wardha, IND
| | - Tanishq Dubey
- Medicine, Jawaharlal Nehru Medical College, Datta Meghe Institute of Higher Education and Research, Wardha, IND
| | - Arpita Jaiswal
- Obstetrics and Gynaecology, Jawaharlal Nehru Medical College, Datta Meghe Institute of Higher Education and Research, Wardha, IND
| |
Collapse
|
2
|
Murroni M, Anedda M, Fadda M, Ruiu P, Popescu V, Zaharia C, Giusto D. 6G-Enabling the New Smart City: A Survey. SENSORS (BASEL, SWITZERLAND) 2023; 23:7528. [PMID: 37687986 PMCID: PMC10490718 DOI: 10.3390/s23177528] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/24/2023] [Revised: 08/18/2023] [Accepted: 08/28/2023] [Indexed: 09/10/2023]
Abstract
Smart cities and 6G are technological areas that have the potential to transform the way we live and work in the years to come. Until this transformation comes into place, there is the need, underlined by research and market studies, for a critical reassessment of the entire wireless communication sector for smart cities, which should include the IoT infrastructure, economic factors that could improve their adoption rate, and strategies that enable smart city operations. Therefore, from a technical point of view, a series of stringent issues, such as interoperability, data privacy, security, the digital divide, and implementation issues have to be addressed. Notably, to concentrate the scrutiny on smart cities and the forthcoming influence of 6G, the groundwork laid by the current 5G, with its multifaceted role and inherent limitations within the domain of smart cities, is embraced as a foundational standpoint. This examination culminates in a panoramic exposition, extending beyond the mere delineation of the 6G standard toward the unveiling of the extensive gamut of potential applications that this emergent standard promises to introduce to the smart cities arena. This paper provides an update on the SC ecosystem around the novel paradigm of 6G, aggregating a series of enabling technologies accompanied by the descriptions of their roles and specific employment schemes.
Collapse
Affiliation(s)
- Maurizio Murroni
- Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy; (M.M.); (M.A.); (D.G.)
| | - Matteo Anedda
- Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy; (M.M.); (M.A.); (D.G.)
| | - Mauro Fadda
- Department of Biomedical Sciences, University of Sassari, 07100 Sassari, Italy; (M.F.); (P.R.)
| | - Pietro Ruiu
- Department of Biomedical Sciences, University of Sassari, 07100 Sassari, Italy; (M.F.); (P.R.)
| | - Vlad Popescu
- Department of Electronics and Computers, Transilvania University of Brașov, 500068 Brașov, Romania;
| | - Corneliu Zaharia
- Department of Electronics and Computers, Transilvania University of Brașov, 500068 Brașov, Romania;
| | - Daniele Giusto
- Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy; (M.M.); (M.A.); (D.G.)
| |
Collapse
|
3
|
Yin Y, Fang H. A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network. SENSORS (BASEL, SWITZERLAND) 2023; 23:6751. [PMID: 37571535 PMCID: PMC10422455 DOI: 10.3390/s23156751] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/11/2023] [Revised: 07/22/2023] [Accepted: 07/26/2023] [Indexed: 08/13/2023]
Abstract
Six-generation (6G) networks will contain a higher density of users, base stations, and communication equipment, which poses a significant challenge to secure communications and collaborations due to the complex network and environment as well as the number of resource-constraint devices used. Trust evaluation is the basis for secure communications and collaborations, providing an access criterion for interconnecting different nodes. Without a trust evaluation mechanism, the risk of cyberattacks on 6G networks will be greatly increased, which will eventually lead to the failure of network collaboration. For the sake of performing a comprehensive evaluation of nodes, this paper proposes a novel multiple role fusion trust evaluation framework that integrates multiple role fusion trust calculation and blockchain-based trust management. In order to take advantage of fused trust values for trust prediction, a neural network fitting method is utilized in the paper. This work further optimizes the traditional trust management framework and utilizes the optimized model for node trust prediction to better increase the security of communication systems. The results show that multiple role fusion has better stability than a single role evaluation network and better performance in anomaly detection and evaluation accuracy.
Collapse
Affiliation(s)
| | - He Fang
- School of Electronic and Information Engineering, Soochow University, Suzhou 215301, China;
| |
Collapse
|
4
|
Suraci C, Pizzi S, Molinaro A, Araniti G. Business-Oriented Security Analysis of 6G for eHealth: An Impact Assessment Approach. SENSORS (BASEL, SWITZERLAND) 2023; 23:s23094226. [PMID: 37177430 PMCID: PMC10181097 DOI: 10.3390/s23094226] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/28/2023] [Revised: 04/03/2023] [Accepted: 04/20/2023] [Indexed: 05/15/2023]
Abstract
Following the COVID-19 outbreak, the health sector is undergoing a deep transformation that is increasingly pushing it towards the exploitation of technology, thus fostering the growth of digital health (eHealth). Cellular networks play a pivotal role in promoting the digitalization of healthcare, and researchers are banking on beyond fifth-generation (B5G) and sixth-generation (6G) technologies to reach the turning point, given that, according to forecasts, 5G will not be able to meet future expectations. Security is an aspect that definitely should not be overlooked for the success of eHealth to occur. This work aims to address the security issue from a poorly explored viewpoint, namely that of economics. In this paper, we first describe the main eHealth services, highlighting the key stakeholders involved. Then, we discuss how next-generation technologies could support these services to identify possible business relationships and, therefore, to realize an innovative business-oriented security analysis. A qualitative assessment of the impact of specific security breaches in diverse business conditions is provided. Moreover, we examine a case study in order to show the effects of security attacks in a definite scenario and discuss their impact on business dynamics.
Collapse
Affiliation(s)
- Chiara Suraci
- Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89100 Reggio Calabria, Italy
| | - Sara Pizzi
- Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89100 Reggio Calabria, Italy
| | - Antonella Molinaro
- Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89100 Reggio Calabria, Italy
| | - Giuseppe Araniti
- Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89100 Reggio Calabria, Italy
| |
Collapse
|
5
|
Sudhamani C, Roslee M, Tiang JJ, Rehman AU. A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges. SENSORS (BASEL, SWITZERLAND) 2023; 23:2356. [PMID: 36850954 PMCID: PMC9965472 DOI: 10.3390/s23042356] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/03/2023] [Revised: 01/27/2023] [Accepted: 01/31/2023] [Indexed: 06/18/2023]
Abstract
Fifth generation (5G) is a recent wireless communication technology in mobile networks. The key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates, massive connectivity and better support to mobility. Enhanced coverage is one of the major issues in the 5G and beyond 5G networks, which will be affecting the overall system performance and end user experience. The increasing number of base stations may increase the coverage but it leads to interference between the cell edge users, which in turn impacts the coverage. Therefore, enhanced coverage is one of the future challenging issues in cellular networks. In this survey, coverage enhancement techniques are explored to improve the overall system performance, throughput, coverage capacity, spectral efficiency, outage probability, data rates, and latency. The main aim of this article is to highlight the recent developments and deployments made towards the enhanced network coverage and to discuss its future research challenges.
Collapse
Affiliation(s)
| | - Mardeni Roslee
- Centre for Wireless Technology, Faculty of Engineering, Multimedia University, Cyberjaya 63100, Selangor, Malaysia
| | | | | |
Collapse
|
6
|
Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Front Psychol 2022; 13:927398. [PMID: 36337532 PMCID: PMC9629147 DOI: 10.3389/fpsyg.2022.927398] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/27/2022] [Accepted: 07/20/2022] [Indexed: 08/01/2023] Open
Abstract
This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, malware, and attacks on personal data. Firms worldwide spend a lot on addressing cybersecurity issues, which grow each year. However, it seems complicated to overcome the challenge because the attackers continuously search for new vulnerabilities in humans, organizations, and technology. This paper is based on the conceptual analysis of social engineering, denial of services, malware, and attacks on personal data. We argue that implementing modern technology for e-commerce and cybersecurity issues is a never-ending game of cat and mouse. To reduce risks, reliable technology is needed, training of employees and consumer is necessary for using the technology, and a strong policy and regulation is needed at the firm and governmental level.
Collapse
Affiliation(s)
- Xiang Liu
- School of Economics and Management, Fuzhou University of International Studies and Trade, Fuzhou, China
| | - Sayed Fayaz Ahmad
- Department of Engineering Management, Institute of Business Management, Karachi, Pakistan
| | - Muhammad Khalid Anser
- Faculty of Business and Management Sciences, Superior University, Lahore, Pakistan
- School of Public Administration, Xi’an University of Architecture and Technology, Xi’an, China
| | - Jingying Ke
- School of Business, Xiamen Institute of Technology, Xiamen, China
| | - Muhammad Irshad
- Department of Management Sciences, University of Gwadar, Gwadar, Pakistan
| | - Jabbar Ul-Haq
- Department of Economics, University of Sargodha, Sargodha, Pakistan
| | - Shujaat Abbas
- Graduate School of Economics and Management, Ural Federal University, Yekaterinburg, Russia
| |
Collapse
|
7
|
Beguni C, Căilean AM, Avătămăniței SA, Zadobrischi E, Stoler R, Dimian M, Popa V, Béchadergue B, Chassagne L. In-Vehicle Visible Light Communications Data Transmission System Using Optical Fiber Distributed Light: Implementation and Experimental Evaluation. SENSORS (BASEL, SWITZERLAND) 2022; 22:6738. [PMID: 36146084 PMCID: PMC9506034 DOI: 10.3390/s22186738] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/11/2022] [Revised: 08/30/2022] [Accepted: 09/03/2022] [Indexed: 06/16/2023]
Abstract
Visible light communications emerges as a promising wireless communication technology that has been found suitable for numerous indoor and outdoor applications. In this article, a new in-vehicle VLC system is designed, implemented, and experimentally evaluated. The purpose of this new system is to provide car passengers with optical wireless communications. The proposed system consists of a VLC emitter integrated into the vehicle's ambient lighting system and a mobile VLC receiver. Unlike any previous works, this article proposes a VLC emitter in which the light from a 3 W LED is distributed on a 2 square meter surface using 500 optical fibers whose main purpose is a decorative one. The proposed prototype has been implemented on a car and evaluated in relevant working conditions. The experimental evaluation of the proposed system has demonstrated the viability of the proposed concept and showed a data rate of 250 kb/s while providing a BER lower than 10-7. As far as we know, the proposed concept is totally new in the VLC literature, opening a new area of utilization for VLC technology: using VLC with optical fiber distributed light.
Collapse
Affiliation(s)
- Cătălin Beguni
- Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
| | - Alin-Mihai Căilean
- Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Laboratoire d’Ingénierie des Systèmes de Versailles, Paris-Saclay University, 78140 Vélizy-Villacoublay, France
| | - Sebastian-Andrei Avătămăniței
- Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
| | - Eduard Zadobrischi
- Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computer Science, Technical University of Cluj-Napoca, 400027 Cluj-Napoca, Romania
| | - Raul Stoler
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
| | - Mihai Dimian
- Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
| | - Valentin Popa
- Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
| | - Bastien Béchadergue
- Laboratoire d’Ingénierie des Systèmes de Versailles, Paris-Saclay University, 78140 Vélizy-Villacoublay, France
| | - Luc Chassagne
- Laboratoire d’Ingénierie des Systèmes de Versailles, Paris-Saclay University, 78140 Vélizy-Villacoublay, France
| |
Collapse
|
8
|
Zahoor S, Ahmad I, Othman MTB, Mamoon A, Rehman AU, Shafiq M, Hamam H. Comprehensive Analysis of Network Slicing for the Developing Commercial Needs and Networking Challenges. SENSORS (BASEL, SWITZERLAND) 2022; 22:6623. [PMID: 36081079 PMCID: PMC9459685 DOI: 10.3390/s22176623] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/21/2022] [Revised: 08/02/2022] [Accepted: 08/10/2022] [Indexed: 06/15/2023]
Abstract
Network slicing (NS) is one of the most prominent next-generation wireless cellular technology use cases, promising to unlock the core benefits of 5G network architecture by allowing communication service providers (CSPs) and operators to construct scalable and customized logical networks. This, in turn, enables telcos to reach the full potential of their infrastructure by offering customers tailored networking solutions that meet their specific needs, which is critical in an era where no two businesses have the same requirements. This article presents a commercial overview of NS, as well as the need for a slicing automation and orchestration framework. Furthermore, it will address the current NS project objectives along with the complex functional execution of NS code flow. A summary of activities in important standards development groups and industrial forums relevant to artificial intelligence (AI) and machine learning (ML) is also provided. Finally, we identify various open research problems and potential answers to provide future guidance.
Collapse
Affiliation(s)
- Sumbal Zahoor
- Department of Electrical Engineering, The University of Lahore, Lahore 54000, Pakistan
| | - Ishtiaq Ahmad
- Department of Electrical Engineering, The University of Lahore, Lahore 54000, Pakistan
| | - Mohamed Tahar Ben Othman
- Department of Computer Science, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
| | - Ali Mamoon
- Department of Software Engineering, Calrom, Manchester M1 6EG, UK
| | - Ateeq Ur Rehman
- Department of Electrical Engineering, Government College University, Lahore 54000, Pakistan
| | - Muhammad Shafiq
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea
| | - Habib Hamam
- Faculty of Engineering, Uni de Moncton, Moncton, NB E1A 3E9, Canada
- International Institute of Technology and Management, Libreville BP1989, Gabon
- Spectrum of Knowledge Production and Skills Development, Sfax 3027, Tunisia
- Department of Electrical and Electronic Engineering Science, School of Electrical Engineering, University of Johannesburg, Johannesburg 2006, South Africa
| |
Collapse
|
9
|
Abdel Hakeem SA, Hussein HH, Kim H. Vision and research directions of 6G technologies and applications. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2022. [DOI: 10.1016/j.jksuci.2022.03.019] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|